-
Notifications
You must be signed in to change notification settings - Fork 32
Security of OpenSCAP daemon features #22
Comments
See https://github.com/OpenSCAP/openscap-daemon/blob/master/org.oscapd.conf for more context |
I don't have much experience with issues like that and I don't know how to technically do that... IMHO the best choice is "optionally drop rights before evaluating " + "allow anyone within some group to do all the unprivileged safe stuff and only let root do the dangerous stuff" So, root should be able don't use his rights. I think, there is a lot of content which don't require root rights. |
In a first step, I would go for dropping privileges for CVE scan. Afterall it may execute content from the network. |
The CVE scan of a containers/images does require root privs because it has to mount a thinpool device. So while the scan itself does not need to be technically run by root, there are steps to setup and tear down that would. |
There are 2 distinct problems we need to solve and I apologize for mixing them up in this thread.
I would like to solve 1) first because it alters the public interface that I want to stabilize. |
On the other hand solving the (2) first, may put some light on (1). These are all hardish questions anyway. From user perspective, it would be great if the tool mimics the priviledges of the user (including libvirt, ssh-agent, selinux label (like What are your thoughts? |
Some parts of the daemon are harmless and we don't have to require
root
permissions to access it -- for example the CVE scan. Some parts are more or less privilege escalation devices, users can get root rights by injecting content with bash remediations. These remediations can do anything root can do, including giving some particular users root rights. This is obviously something we have to avoid!These are some ways to solve this:
Thoughts? I'd like to discuss this a little before committing to any direction.
@ybznek @baude @isimluk
The text was updated successfully, but these errors were encountered: